Types of Cybersecurity Jobs

Cybersecurity employee working on cyberdefense

Cybersecurity was once a career path that was only applicable to government agencies and defense contractors. However, now many businesses and corporations hire cybersecurity experts to work on-staff. Industries like healthcare, finance and retail all work with cybersecurity professionals to ensure their technology systems are protected from cyberattacks.

Cybersecurity jobs are growing rapidly. Since 2013, the demand for cybersecurity professionals has grown three times faster than the demand for IT professionals, as the number of cybersecurity job postings has grown by 94%, whereas job postings for IT have only grown by 30%.1 The increased demand for cybersecurity experts means the career paths they follow can be lucrative.

Cybersecurity specialists can start out by earning a Bachelor of Science in Cybersecurity degree before moving into advanced coursework once they are on the job. The more formal training a cybersecurity expert has in the field, the higher the salary they can negotiate. 

Let's take a look at some of the different types of cybersecurity jobs in the workforce.

In This Article:

Cybersecurity Jobs and Career Paths for Cybersecurity Graduates

In today’s technological world, cybersecurity specialists are needed more than ever, as more and more organizations require increased security for their networks and a reliable way to discern whether networks are secure. Careers in information security, cybersecurity and research are needed in a variety of fields, such as science and business. In this guide, you’ll learn how to work in cybersecurity and what cybersecurity degrees are needed.

Computer and Information Research Managers

Also known as IT project managers, computer and information research managers are responsible for directing operations within a cybersecurity firm. They usually identify what an organization needs and take the steps necessary to provide for that need, such as by installing software systems and upgrades, testing network security, budgeting and providing qualified personnel.

Becoming a computer and information research manager requires a bachelor’s degree in computer and information technology or engineering technologies and possibly a graduate degree, usually a Master of Business Administration. You would also need five or more years of work experience before you can work as a computer and information research manager.2

Computer Systems Analysts

Computer systems analysts, also known as “systems architects,” devise new ways to improve systems. To do this, they speak with managers to determine what changes must be made to their existing networks, then either locate or design the technology and upgrades needed to improve the networks. These changes may include creating new systems or supervising new upgrades. Computer systems analysts also test these new systems and train other people to use them.

To become a computer systems analyst, you will need a bachelor’s degree, which can be in a variety of subjects. The most common are computer and information technology and mathematics, but people with an education in business or management information systems are also able to find jobs in this field. You can also major in liberal arts and obtain experience in programming or another technology field, although this pathway to a career as a computer systems analyst is less common.3 

Computer Information Security Officers

The primary responsibility of a chief information security officer (CISO) is to manage the IT security division of a company, which includes planning and coordinating all aspects of computer, network and data security. To achieve this, the CISO is tasked with recruiting top cybersecurity experts to their team. This role requires a comprehensive understanding of IT security and strategy, as well as the ability to effectively communicate with various stakeholders.

Although a CISO can be employed with only a bachelor's degree in cyber or information security, having a Master of Science in Cybersecurity degree or an MBA in a related field can enhance your earning potential. 

Information Security Analysts

Information security analysts (ISAs) are responsible for the protection of an organization's computer systems and networks. They plan and execute programs and other measures, including installing and using software for data encryption and firewalls. Additionally, ISAs help design and execute plans and methods for the recovery of data and systems following a cyberattack. ISAs stay on top of the latest industry trends and cyber threats, which involves researching new security technologies and networking with other professionals.

Some bachelor's degrees now allow students to specialize in information security. An information security analyst generally holds a bachelor's degree, and more of them are specializing in information security at the undergraduate level.

IT Security Consultants

IT security consultants are critical to modern business operations by providing guidance to clients on the most efficient and cost-effective methods for safeguarding their organization's cybersecurity objectives. They evaluate different aspects of the system, such as software and networking equipment, to enhance network performance.

IT security consultants differ from security analysts by specializing in a certain field, allowing them to advise on a variety of issues within that field. Whereas security analysts typically specialize in one specific area within a field and may offer advice related to that specific area only. IT security consultants may entail long and flexible work hours, as well as frequent traveling to various client sites. Over time, this role can be rewarding, particularly due to the flexibility it offers.

Security Architects

Security architects play a critical role in maintaining an organization's network security. They can be found across various sectors such as businesses, government agencies, and nonprofits. Apart from designing and managing security systems, they are also responsible for devising and executing security policies and protocols that govern the access of computer, network and data systems by employees and other authorized personnel.

Typically, a security architect must possess a bachelor's degree in cybersecurity. However, due to the leadership responsibilities that accompany the role, employers often prefer candidates with prior experience.

Computer Network Architects

Also known as “network engineers,” computer network architects build data communication networks. These networks can include local area networks, which can be small connections between offices, or wide area networks and intranets that may include cloud infrastructure and other large projects. Computer network architects plan these networks, provide upgrades for hardware and software, predict what a network may need in the future and research new ways to improve networks.

If you’re interested in how to work in cybersecurity, this is an excellent option. Aspiring computer network architects need a bachelor’s degree in computer and information technology or engineering, and some employers require a Master of Business Administration in information systems. You will also need at least five years of work experience in the information technology field — most often as a network and computer system administrator, database administrator or computer systems analyst — before you can work as a computer network architect. You may also need to be certified in the products you specialize in. You can obtain this certification from software companies or vendors for specific products.4

Penetration Testers

To expose cybersecurity weaknesses so that they may be reinforced, penetration testers gain permission to exploit discovered vulnerabilities within a computer or network, including operating systems, utilities, applications and improper configurations. 

Penetration testers often hold bachelor's degrees in cybersecurity. Because they work with sensitive material, they may often be required to train in advanced methodologies and techniques within the industry.

Computer and Information Research Scientists

Computer and information research scientists work with software to improve its use by researching problems and conducting experiments to test systems. They may also create new programming languages and systems to make the use of software systems easier for programmers.

These professionals may use their knowledge to improve business, science and other fields. To become a computer and information research scientist, professionals should have a master’s degree or higher in computer science, computer engineering or information technology.5 

Types of Cybersecurity Jobs in Demand

Demand for cybersecurity specialists has increased over the last few years, largely because of the rise of cybercrime across the world. In the past, companies relied on old networks to support their businesses, and many of these companies still rely on these same networks today. With new technology becoming more available and easier to access, these networks are now highly vulnerable to cyberattacks. In response, the demand for cybersecurity specialists rose to combat this wave of cybercrime.

The rise in demand for cybersecurity specialists also caused the cybersecurity field to grow. Over time, cybersecurity came to encompass more roles, including software development, auditing and technical support. This expansion of the field created more jobs and increased demand.6

For example, some cybersecurity jobs with a high demand for new workers include jobs in information security, penetration testing and computer and information research.

  • Information security analysts: According to the U.S. Bureau of Labor Statistics (BLS) Occupational Outlook Handbook, job growth for information security analysts is expected to increase by about 35% from 2021 to 2031, much faster than the average for all professions. This accounts for an estimated increase of 56,500 jobs in the field.7 Information security analysts may also earn a substantial salary. According to the BLS, in May 2021, information security analysts earned a median annual salary of $102,600.
  • Penetration testers: These professionals and other quality assurance analysts are also in high demand, as the BLS reports that job growth for software developers, quality assurance analysts and testers is expected to increase by about 25% from 2021 to 2031. This is much faster than the average for all professions, and it accounts for an estimated increase of 411,400 jobs in the field.9 According to the BLS, software developers, quality assurance analysts and testers earned a median salary of $109,020 in May 2021.10 
  • Computer and information research scientists: Like many other cybersecurity jobs, there is a robust demand for computer and information research scientists in today’s workforce. According to the BLS, the job growth rate for computer and information research scientists is estimated to increase by about 21% from 2021 to 2031. This is much faster than the average for all professions and accounts for an estimated increase of 7,100 jobs in this field.11 In May 2021, computer and information research scientists earned a median salary of $131,490 per year, according to the BLS.12

Are you interested in pursuing one of these careers in cybersecurity? You can get started on this path by completing the form on this page and enrolling at Grand Canyon University (GCU). GCU is pleased to offer the Bachelor of Science in Cybersecurity and the Bachelor of Science in Information Technology with an Emphasis in Cybersecurity, which will provide you with fundamental knowledge in security architecture design, security frameworks and protecting networks from cyberattacks. With this knowledge and skill set, you can pursue many different types of cybersecurity jobs in a rapidly growing workforce. 

 

Recruiting Watchers for the Virtual Walls: The State of Cybersecurity Hiring, Recruiting Watchers for the Virtual Walls: The State of Cybersecurity Hiring, in March 2023

2 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer and Information Systems Managers in January 2023. 

3 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer Systems Analysts in January 2023. 

4 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer Network Architects in January 2023. 

5 U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer and Information Research Scientists in January 2023. 

6 ClearanceJobs, Cybersecurity Remains a Top In-Demand Job But Finding Good Help Isn’t Easy in January 2023. 

7 COVID-19 has adversely affected the global economy and data from 2020 and 2021 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, data shown is effective September 2022, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Information Security Analysts, retrieved on Jan. 12, 2023. 

8 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Information Security Analysts as of May 2021, retrieved on Oct. 11, 2022. Due to COVID-19, data from 2020 and 2021 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates as information security analysts. It does not reflect the earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates. 

9 COVID-19 has adversely affected the global economy and data from 2020 and 2021 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, data shown is effective September 2022, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Software Developers, Quality Assurance Analysts and Testers, retrieved on Jan. 12, 2023. 

10 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Software Developers, Quality Assurance Analysts and Testers as of May 2021, retrieved on Oct. 11, 2022. Due to COVID-19, data from 2020 and 2021 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates software developers, quality assurance analysts and testers. It does not reflect the earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates. 

11 COVID-19 has adversely affected the global economy and data from 2020 and 2021 may be atypical compared to prior years. The pandemic may impact the predicted future workforce outcomes indicated by the U.S. Bureau of Labor Statistics as well. Accordingly, data shown is effective September 2022, which can be found here: U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, Computer and Information Research Scientists, retrieved on April 18, 2023.

12 The earnings referenced were reported by the U.S. Bureau of Labor Statistics (“BLS”), Computer and Information Research Scientists as of May 2021, retrieved on Oct. 11, 2022. Due to COVID-19, data from 2020 and 2021 may be atypical compared to prior years. The pandemic may also impact the predicted future workforce outcomes indicated by the BLS. BLS calculates the median using salaries of workers from across the country with varying levels of education and experience and does not reflect the earnings of GCU graduates as computer and information research scientists. It does not reflect the earnings of workers in one city or region of the country. It also does not reflect a typical entry-level salary. Median income is the statistical midpoint for the range of salaries in a specific occupation. It represents what you would earn if you were paid more money than half the workers in an occupation, and less than half the workers in an occupation. It may give you a basis to estimate what you might earn at some point if you enter this career. You may also wish to compare median salaries if you are considering more than one career path. Grand Canyon University can make no guarantees on individual graduates’ salaries as the employer the graduate chooses to apply to, and accept employment from, determines salary not only based on education, but also individual characteristics and skills and fit to that organization (among other categories) against a pool of candidates. 

 

Approved by an instructor for the College of Science, Engineering and Technology on Feb. 1, 2023.

The views and opinions expressed in this article are those of the author’s and do not necessarily reflect the official policy or position of Grand Canyon University. Any sources cited were accurate as of the publish date.